A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
暂无分享,去创建一个
[1] Xiaoyuan Yang,et al. ECGSC: Elliptic Curve Based Generalized Signcryption , 2006, UIC.
[2] Xu An Wang,et al. Provable Secure Generalized Signcryption , 2007, IACR Cryptol. ePrint Arch..
[3] Sunder Lal,et al. Efficient Generalized Signcryption Schemes , 2010, IACR Cryptol. ePrint Arch..
[4] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[5] Rongxing Lu,et al. Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption , 2015, Inf. Sci..
[6] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[7] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[8] Gang Yu,et al. Provable secure identity based generalized signcryption scheme , 2010, Theor. Comput. Sci..
[9] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[10] Sunder Lal,et al. ID based generalized signcryption , 2008, IACR Cryptol. ePrint Arch..